Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Google Google-Workspace-Administrator Associate Google Workspace Administrator Exam Practice Test

Associate Google Workspace Administrator Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

You are onboarding a new employee who will use a company-provided Android device. Your company requires the ability to enforce strong security policies on mobile devices, including password complexity requirements and remote device wipe capabilities. You need to choose the appropriate Google Workspace mobile device management solution. What should you do?

Options:

A.

Use a third-party mobile device management (MDM) solution to manage the device.

B.

Allow the employee to use their personal device without enrolling it in any mobile device management (MDM) solution.

C.

Implement Google’s basic management solution for the mobile device.

D.

Implement Google’s advanced management solution for the mobile device.

Question 2

Your organization wants to prevent a group of users from logging into their Google Drive when they are traveling internationally for business.

You have added these users to an organizational unit (OU). You need to secure the users’ access to the Google Drive app to meet this requirement.

What should you do?

Options:

A.

Disable Google Drive for users in the OU.

B.

Define location-based access levels. Assign the levels to the Google Drive app for the OU.

C.

Require 2-step verification (2SV) when users in the OU sign in.

D.

Define user-based access levels. Assign the levels to the Google Drive app for the OU.

Question 3

Your organization recently deployed Google Workspace. Over 3,000 external contacts were shared in public folders in Microsoft Exchange before the implementation. You need to ensure that these external contacts appear to domain users in Gmail. What should you do?

Options:

A.

Export the external contacts to a CSV file, upload the file to Google Drive, and instruct users to import to their My Contacts.

B.

Use Google Cloud Directory Sync to sync the external contacts from the public folders in Microsoft Exchange to the Directory.

C.

Use the Domain Shared Contacts API to add the external contacts to the Directory.

D.

Create a user account, add the external contacts, and delegate them to all users in the domain.

Question 4

Several employees from your finance department are collaborating on a long-term, multi-phase project. You need to create a confidential group for this project as quickly as possible. You also want to minimize management overhead. What should you do?

Options:

A.

Create a Google Group by using Google Cloud Directory Sync (GCDS) to automatically sync the members.

B.

Create a dynamic group and define the Department user attribute as a condition for membership with the value as the finance department.

C.

Create a Google Group and update the settings to allow anyone in the organization to join the group.

D.

Create a Google Group and appoint a group admin to manage the membership of this group.

Question 5

Your company wants to start using Google Workspace for email. Your domain is verified through a third-party provider. You need to route the email to Google Workspace. What should you do?

Options:

A.

Change your domain’s A record to point to Google’s mail servers.

B.

Configure a forwarding rule in your current email system to redirect all messages to Gmail.

C.

Update your domain’s MX records to the Google Workspace MX records provided in the setup instructions.

D.

Create a CNAME record that maps your domain to “gmail.com.”

Question 6

You are investigating a potential data breach. You need to see which devices are accessing corporate data and the applications used. What should you do?

Options:

A.

Analyze the audit log in the Admin console for device and application activity.

B.

Analyze the security investigation tool to access device log data.

C.

Analyze the Google Workspace reporting section of the Admin console.

D.

Analyze the User Accounts section in the Google Admin console.

Question 7

Your organization uses live-streaming to host large Google Meet meetings. You need to limit the participation to affiliated Google Workspace domains by using the Admin console. What should you do?

Options:

A.

Add the Trusted Workspace domain names in the Stream dialog box.

B.

Turn off live streaming to Youtube.

C.

Add participants to an organizational unit (OU). Turn on live streaming.

D.

Turn on in-house live streaming. Invite users from affiliated domains.

Question 8

Your organization is implementing a new customer support process that uses Gmail. You need to create a cost-effective solution that allows external customers to send support request emails to the customer support team. The requests must be evenly distributed among the customer support agents. What should you do?

Options:

A.

Create a Google Group, enable collaborative inbox settings, set posting permissions to “Anyone on the web”, and add the customer support agents as group members.

B.

Use delegated access for a specific email address that represents the customer support group, and add the customer support team as delegates for that email address.

C.

Create a Google Group, add the support agents to the group, and set the posting permissions to “Public.”

D.

Set up an inbox for the customer support team. Provide the login credentials to the customer support team.

Question 9

You are applying device and user policies for employees in your organization who are in different departments. You need each department to have a different set of policies. You want to follow Google-recommended practices. What should you do?

Options:

A.

Create separate top-level organizational units for each department.

B.

Create an Access group for each department. Configure the applicable policies.

C.

Add all managed users and devices in the top-level organizational unit.

D.

Create a child organizational unit for each department.

Question 10

Your organization is migrating their current on-premises email solution to Google Workspace. You need to ensure that emails sent to your domain are correctly routed to Gmail. What should you do?

Options:

A.

Change the Mail Exchange (MX) records in your current email domain’s DNS settings to point to Google’s mail servers.

B.

Set up email forwarding from your on-premises email provider to Gmail.

C.

Create a content compliance rule to filter and route incoming emails.

D.

Configure SPF, DKIM, and DMARC records in your current email domain’s DNS settings.

Question 11

You are employed at a multinational organization with offices around the world. You want to ensure that employees in each region receive region-specific emails in a timely manner with minimal administrative burden. When new employees are hired in each region, you want to automate the email distribution process so that staff changes are reflected quickly. What should you do?

Options:

A.

Create a Google Group for each region and add the respective employees to the appropriate group.

B.

Create a dynamic group for each region by setting the location as a condition.

C.

Create a Google Group for each region and set permissions that allow employees to discover and join the groups.

D.

Create a security group for each region, and apply the location label to allow employees to join based on their region.

Question 12

A department at your company wants access to the latest AI-powered features in Google Workspace. You know that Gemini offers advanced capabilities and you need to provide the department with immediate access to Gemini’s features while retaining control over its deployment to ensure that corporate data is not available for human review. What should you do?

Options:

A.

Enable Gemini for the department’s organizational unit and assign Gemini licenses to users in the department.

B.

Monitor Gemini adoption through the administrator console and wait for wider user adoption before assigning licenses.

C.

Enable Gemini for non-licensed users in that department so they have immediate access to the free service.

D.

Enable Alpha features for the organization and assign Gemini licenses to all users.  

Question 13

Your company’s legal department has issued a litigation hold that requires you to preserve all data related to a specific project. You need to ensure that all data for this project, including emails, documents, and chats, are preserved indefinitely and cannot be deleted by users. What should you do?

Options:

A.

Create a hold in Google Vault that includes all users and data sources associated with the project.

B.

Assign an Archived User license to all users involved in the project.

C.

Set up a retention rule in Google Vault that retains all data from Gmail and Drive indefinitely.

D.

Export all project related data from Google Workspace and store the data in a separate, secure location.

Question 14

Your company's sales team writes many business proposals in Google Docs. They want to streamline the proposal process by using templates. You need to create a document template with pre-populated sections that the sales team can access. What should you do?

Options:

A.

Create the templates in Google Drive. Grant edit access to the sales team.

B.

Create the templates in Google Drive. Make a copy for each sales representative. Transfer ownership of each template to the sales representatives.

C.

Enable organization branding in the Admin console. Create the templates in Google Drive. Add the templates to default themes and templates for the entire organization.

D.

Create the templates in Google Drive and download the files as PDFs. Upload PDF files to a drive shared with your sales team.

Question 15

You manage Chrome Enterprise browsers for your large organization. You want to ensure that specific extensions are automatically installed on all managed Chrome Enterprise browsers. What should you do?

Options:

A.

Allowlist the specific Chrome browser extensions.

B.

Configure a script to deploy the extensions upon user login.

C.

Publish the extensions in the Chrome Web Store.

D.

Force-install the extensions through Chrome browser policies.

Question 16

Your company is transitioning to Google Workspace from legacy communication and collaboration applications. User accounts are managed in Active Directory and synced to Google Workspace by using Google Cloud Directory Sync (GCDS). Your company is implementing a new security policy for all accounts that requires complex passwords. Passwords must be at least 20 characters long, contain 3 symbols, 4 numbers, and 2 capital letters.

You need to enforce the new password policy in Google Workspace. What should you do?

Options:

A.

Share the instructions for changing a Google account password with your users. Monitor password strength in the Google Admin console as users change their passwords.

B.

Enable strong password enforcement and require a minimum length of 20 characters at the top-level organizational unit.

C.

Create a password policy in Active Directory. Install Password Sync on the global catalog servers for Active Directory and require a password change for your users.

D.

Create a password policy in Active Directory. Enable password synchronization in GCDS.

Question 17

Your compliance team has observed that employees at your organization are frequently resetting their passwords and is concerned about account hijacking. You need to create a solution to notify the compliance team whenever a user updates or resets their password. What should you do?

Options:

A.

Create and enforce a new password policy for all users in your organization.

B.

Move all compliance team members into a separate organizational unit (OU). Create and enforce a new password policy for the members of this OU.

C.

Create an activity rule that is triggered by the User’s password changed event. Add compliance team members as email recipients.

D.

Create a new alert by using user log events. Check that the challenge type is “Password”, and add the compliance team as email recipients.

Question 18

A user is experiencing intermittent issues accessing their Gmail inbox. Sometimes their Gmail loads slowly, and other times the user encounters error messages that haven’t been documented. You need to effectively troubleshoot this recurring problem. What should you do?

Options:

A.

Check the Google Workspace Status Dashboard for any reported service disruptions.

B.

Instruct the user to generate a HAR file the next time they experience slowness or an error.

C.

Instruct the user to try to access Gmail from another device or network to see if the issue persists.

D.

Instruct the user to clear their browser cache and cookies.

Question 19

Your organization allows employees to use their personal devices for work purposes. You want to ensure these devices follow the company’s security policies. You need to choose a mobile management solution that provides minimal passcode enforcement and allows for an admin to remotely wipe a user’s account from the device. You also want to avoid having to install agents on employees’ personal devices. What should you do?

Options:

A.

Implement Google’s advanced management on mobile devices.

B.

Implement Google’s basic management on mobile devices.

C.

Enforce a strong password policy, and enforce the password policy at the next sign-in.

D.

Deploy a third-party mobile device management (MDM) solution.

Question 20

Your company wants to minimize distractions and inappropriate content in their Google Chat spaces. You need to give trusted employees the ability to remove messages and ban users from specific Chat spaces. What should you do?

Options:

A.

Assign the trusted employees as moderators for the relevant Chat spaces.

B.

Create a data loss prevention (DLP) rule that blocks inappropriate content from being shared

C.

Use the security investigation tool to audit and monitor Chat messages.

D.

Disable all Chat spaces except those specifically approved by management.

Question 21

Your company’s security team should be able to investigate unauthorized external file sharing. You need to ensure that the security team can use the security investigation tool and you must follow the principle of least privilege. What should you do?

Options:

A.

Grant the super admin role to a delegate from the security team.

B.

Create a pre-built reporting role. Assign the role to the security team alias.

C.

Share the Drive audit log with the security team.

D.

Create a custom admin role with security center privileges. Assign the role to the individual security team members.

Question 22

Your company has offices in several different countries and is deploying Google Workspace. You're setting up Google Calendar and need to ensure that, when a user is creating a Google Calendar event, rooms are suggested in a nearby office. What should you do?

Options:

A.

Assign building ID, floor name, and floor section to define users' work locations based on defined buildings and rooms.

B.

Add your users to Google Groups by location. Add room resources to the corresponding groups.

C.

Add your users to organizational units (OUs) by location. Add room resources to the corresponding OUs.

D.

Restrict room sharing to a dynamic group based on user location.

Question 23

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Your organization has a Shared Drive with 150 users organized as a group. All users of the group need to be able to add and edit files, but the ability to move, delete, and share content must be limited to a single user. You need to configure the shared drive to meet these requirements efficiently.

What should you do?

Options:

A.

Create a folder inside the shared drive. Share the files with the group by using the share function.

B.

Create a folder inside the shared drive. Share the folder link with the group.

C.

In the Admin console, assign Contributor access for the shared drive to each user. Assign Content Manager access for the shared drive to the single user.

D.

In the Admin console, assign Contributor access for the shared drive to the group. Assign Content Manager access for the shared drive to the single user.

Question 24

Your company’s security team has requested two requirements to secure employees’ mobile devices-enforcement of a passcode and remote account wipe functionality. The security team does not want an agent to be installed on the mobile devices or to purchase additional licenses. Employees have a mix of iOS and Android devices. You need to ensure that these requirements are met. What should you do?

Options:

A.

Implement a third-party enterprise mobility management (EMM) provider.

B.

Set up advanced mobile management for iOS devices and basic mobile management for Android devices.

C.

Set up basic management for both iOS and Android devices.

D.

Set up advanced management for both iOS and Android devices.

Question 25

You work at a large organization that prohibits employees from using Google Sites. However, a task force comprised of three people from five different departments has recently been formed to work on a project assigned by the Office of the CIO. You need to allow the users in this task force to temporarily use Google Sites. You want to use the least disruptive and most efficient approach. What should you do?

Options:

A.

Turn Google Sites access on for each of the 15 users in the task force.

B.

Create a configuration group for the task force's 15 users. Grant Google Sites access to the group.

C.

Place the 15 task force users into a new organizational unit (OU). Turn on Google Sites access for the OU.

D.

Create an access group for the task force's 15 users. Grant Google Sites access to the group.

Question 26

Your company handles sensitive client data and needs to maintain a high level of security to comply with strict industry regulations. You need to allow your company’s security team to investigate potential security breaches by using the security investigation tool in the Google Admin console.

What should you do?

Options:

A.

Create an activity rule that triggers email notifications to the security team whenever a high-risk security event occurs.

B.

Assign the User Management Admin role to the security team.

C.

Assign the super admin role to the security team

D.

Create an administrator role with Security Center access. Assign the role to the security team.

Question 27

You are designing a group structure for your company that will be used to grant access to a specific shared drive. You need this solution to automatically add and remove employees based on their job role. What should you do?

Options:

A.

Create a security group. Add all employees with the desired job role. Grant the security group access to the shared drive.

B.

Create a distribution list. Add all employees with the desired job role. Grant the distribution list access to the shared drive.

C.

Create a dynamic group. Set the membership criteria to the desired job role. Grant the dynamic group access to the shared drive.

D.

Create a configuration group. Add users on an exception basis. Grant the configuration group access to the shared drive.